A Fast IP Routing Lookup Scheme for Gigabit Switching Routers

Size: px
Start display at page:

Download "A Fast IP Routing Lookup Scheme for Gigabit Switching Routers"

Transcription

1 A Fast IP Routng Looup cheme for Ggabt wtchng Routers Nen-Fu Huang, h-mng Zhao, Jen-Y Pan, and Ch-An u Department of Computer cence, Natonal Tsng Hua Unversty Hsn-Chu, Tawan, 343, R.O.C. E-mal: {nfhuang, smzhao, dr443, casu}@cs.nthu.edu.tw Abstract-One of the ey desgn ssues for the new generaton IP routers s the route looup mechansm. For each ncomng IP pacet, the IP routng requres to perform a longest prefx matchng on the address looup n order to determne the pacet s next hop. Ths paper presents a fast route looup mechansm that only needs tny RAM and can be mplemented n a ppelned sll n hardware. d on the proposed scheme, the forwardng table s tny enough to ft n RAM wth very low cost. For example, a large routng table wth 4, routng entres can be compacted to a forwardng table of Kbytes. In the worst case, the number of memory accesses for a looup s three. When mplemented n a ppelne sll n hardware, the proposed mechansm can acheve one routng looup every memory access. Wth current ns RAM, ths mechansm furnshes approxmately mllon routng looups per second. Ths s much faster than any current commercally avalable routng looup schemes. I. INTRODUCTION Due to the advent of the World Wde Web (WWW), the networ traffc n the Internet s doublng every few months. The bandwdth hungry applcatons, such as Vdeo-ondemand, Dstance learnng, Dgtal lbrares, are expected to gve traffc another maor boost. In order to contnue to furnsh good Qo servce, three ey desgn ssues on the next generaton IP routers are: ln speeds, router throughput, and pacet forwardng rates. The frst two ssues are currently readly avalable. For example, fber-optc cables can provde faster ln speeds, and new IP swtchng technology (Layer-3 swtchng or mult-layer swtchng) can be used to transmt pacets from the nput nterface of a router to the correspondng output nterface at ggabt rates. Ths paper deals wth the thrd desgn ssue, pacet forwardng, for whch current mechansms perform poorly as ln speeds ncrease. Although the MAC address looup scheme has been acheved at Mbps (Fast Ethernet) for the Brdges and Layer-2 wtches n the past few years, t s based on the exact matchng on the destnaton (MAC) address. For the Internet routers [], what we need s to perform the longest prefx matchng between a destnaton IP address and the routng table nstead of the exact matchng. Ths also mples that the famous schemes for exact matchng, such as perfect matchng and standard Content Addressable Memores (CAMs) cannot drectly be employed for IP address looups [7]. nce the number of end users as well as the amount of routng nformaton on the Internet grows exponentally, the concept of prefx matchng was ntroduced to reduce routng table entres n the early s. Bascally, the IP addresses space s dvded nto classes A, B, and C and stes are allowed //$. (c) IEEE to have 24, 6, and bts for addressng respectvely. Nevertheless, ths partton s nflexble and may waste of the address space, especally the class B addresses. In order to use ths crucal resource, bundles of class C networs were furnshed nstead of class B addresses. Ths of course ntroduces the growth of the routng table entres. On the other sde, the deployment of Classless Inter-Doman Routng (CIDR) scheme allows for arbtrary aggregaton of networs to reduce the routng table entres []. In the way of CIDR, each IP route s dentfed by a <route prefx, prefx length> par, where the prefx length s n the range between and 32 bts ( stands for default route). When an IP pacet s receved, the IP router computes whch of the prefxes n ts forwardng database has the longest match when compared to the destnaton IP address n the pacet. The pacet s then forwarded to the output ln assocated wth that prefx. For example, a forwardng database may have the entres <.2/6>, <.2.6/24>, and <.2.6.6/32>. An IP address.2.5. has longest prefx matchng wth the frst entry. On the other hand, an IP address has longest prefx matchng wth the last entry. Recently, several fast routng looup mechansms have been proposed [3], [4], [5], [6], [7], [], [2], [3]. For example, a novel forwardng table structure s desgned for quc routng looups by Degermar, Brodn, Carlsson, and Pn [3]. The forwardng tables are very small such that a large routng table wth 4, entres can be compacted to a forwardng table of 5-6 Kbytes. Ths s a software-based soluton. If n hardware mplementaton, the mnmum and maxmum number of memory accesses for a looup s 2 and, respectvely. Gupta, Ln, and McKeown presented fast routng looup schemes based on the huge DRAM [5]. The maxmum number of memory accesses for a looup s 2 wth a forwardng table of 33Mbytes. By addng an ntermedate length table, the forwardng table can be reduced to Mbytes, but the maxmum number of memory accesses for a looup s ncreased to 3. When mplemented n a ppelned fashon n hardware, the proposed schemes can acheve one route looup every memory. Ths furnshes about 2 mllon looups per second. Waldvogel, Varghese, Turner, and Plattner proposed a looup scheme based on the bnary search mechansm [3]. Ths scheme scales very well as address and routng table szes ncrease. It requres a worst case tme of log 2 (address bts) hash looups. Thus, 5 hash looups are needed for IPv4 and 7 for IPv6 (2-bt) [2]. Ths software based bnary search wor s further mproved by employng the cache structure and usng the multway and multcolumn search [6]. For a database of N prefxes wth address length W, the natve bnary search scheme taes O(W*logN) searches. Ths mproved schemes taes only

2 O(W+logN) searches. These software based bnary search schemes are not easy to be mplemented n hardware. Ths paper presents a fast longest prefx matchng mechansm for IP swtchng routers that only needs tny RAM and can be mplemented n a ppelned sll n hardware. d on the proposed scheme, the forwardng database s tny enough to ft n RAM wth very low cost. For example, a large routng table wth 4, routng entres can be compacted to a forwardng table of Kbytes wth the cost less of U$3. Most of the address looups can be done by a memory access. In the worst case, the number of memory accesses for a looup s three. When mplemented n a ppelne sll n hardware, the proposed mechansm can acheve one routng looup every memory access. Wth current ns RAM, ths mechansm furnshes approxmately mllon routng looups per second. Ths s much faster than any current commercally avalable routng looup schemes. The rest of the paper s organzed as follows. The archtecture of the Mult-ggabt swtchng router and the forwardng engne are ntroduced n ecton 2. The proposed longest prefx matchng scheme s presented n ecton 3. The hardware mplementaton and the performance analyss of the proposed scheme are descrbed n ecton 4 and ecton 5, respectvely. Fnally, a concluson remar s gven n ecton 6. number) where the pacet should be forwarded. The MAC address substtuton module then substtutes the source MAC address and the destnaton MAC address of the pacet before t s forwarded nto the nterface port. The source MAC address s replaced by that of the output nterface, and the destnaton MAC address s replaced by that of the mmedate next hop (a router or the destnaton host). The bottlenec of the forwardng engne s the route looup and we wll focus on the desgn and hardware mplementaton of fast looup scheme. CPU wtchng Fabrc.. Ln Interfaces Forwardng Engne Fg.. Archtecture of Ggabt IP swtchng router. II. GIGABIT IP WITCHING ROUTER ARCHITECTURE The archtecture of the Ggabt IP swtchng router s schematcally shown n Fg., where a number of ln nterfaces, a CPU module, and a forwardng engne are nterconnected wth a swtchng fabrc. The forwardng engne employs a forwardng database, a local verson of the routng table, downloaded from the CPU module to mae the routng decson. Although routng updates may occur frequently, t s not necessary to download a new forwardng database for each routng update. Ths s because the routng protocols, such as RIP and OPF, need tme n the order of mnutes to converge, and the forwardng tables can grow a lttle stale and need only be updated once per few seconds. The CPU module executes the routng protocols, such as RIP and OPF, and needs a dynamc routng table for fast updates and fast generaton of forwardng databases. On the other hand, t s better to optmze the forwardng database to furnsh fast looups. Ths also mples that the forwardng databases need not be dynamc. 32 Bts External Data Bus 32 Bts Internal Data Bus Header Verfcaton Route Looup IP TTL Decrement and Checsum Update WBE Bottlenec of Forwardng Engne The archtecture of the forwardng engne (FE) s shown n Fg. 2. For an ncomng IP pacet, the route looup process (based on the destnaton IP address of the pacet), header verfcaton, and header update are ntated smultaneously. If the IP header s not correct, the pacet s dropped and the looup s termnated. Otherwse, the header s updated nto the pacet header (TTL decrement and checsum update) and the route looup module wll provde the next hop (port //$. (c) IEEE B MAC Address ubsttuton Fg. 2. Archtecture of FE wth super-scalar and ppelne desgn.

3 III. IP ROUTING LOOKUP CHEME The most straghtforward looup scheme s to have a forwardng database n whch an entry s desgned for each 32-bt IP address as shown n Fg. 3. Ths desgn needs only one memory access for IP address looup but the sze of forwardng database (next hop array) s too huge (2 32 = 4 GB) [5]. To reduce the sze of forwardng database, the sll of ndrect looup shown n Fg. 4 can be employed [5]. Each IP address s parttoned nto two parts: segment (6-bt) and offset (6-bt). The segmentaton table s wth the sze of 64K entres (2 6 ) and each entry (32-bt) records ether the next hop (port number, value < 256) of the routng or a ponter (value > 255) ponts to the assocated (NHA). Each NHA conssts of 64K entres (2 6 ) and each entry (-bt) records the next hop (port number) of the destnaton IP address. Thus, for a destnaton IP address a.b.x.y, the a.b s used as the ndex of the egmentaton Table and the x.y s employed as that of the assocated NHA, f necessary. Thus, for a segment a.b, f the length of the longest prefx belongs to ths segment s less than or equal to 6 (the segment length), then the correspondng entres of the egmentaton Table store the output port drectly, and the assocated NHA s not necessary. On the other hand, f the length of the longest prefx belongs to ths segment s greater than 6, then an assocated 64KB NHA s requred. In ths desgn, the maxmum number of memory accesses for an IP address looup s two. In [5], the segment length s of 24-bt and therefore a 6 Mbytes segmentaton table s requred. Although the ndrect looup scheme furnshes fast looup (up to 2 memory access), t does not consder the dstrbuton of the prefxes belongs to a segment. A 64KB NHA s requred as long as the length of the longest prefx belongs to ths segment s greater than 6. We now show our dea that by consderng the dstrbuton of the prefxes wthn a segment, we can further reduce the sze of the assocated NHA as shown n Fg. 5. Agan, the IP address s stll parttoned nto segment (6-bt) and offset ( 6-bt). The segment s also 6-bt and the egmentaton table s wth the sze of 64K entres, each one (32-bt) s dvded nto two felds: ponter/next hop (2-bt) and offset length (4-bt). The frst feld records ether the next hop (port number, value < 256) of the routng or a ponter (value > 255) ponts to the assocated NHA. The second feld ndcates the length of the offset ( bts, < 6). For offset of -bt length, the assocated NHA s wth the sze of 2 entres. Remember that for the ndrect looup mechansm [5], the offset s always of length 6. Now, for each segment, the offset length ndcates how many entres are needed n the assocated NHA. Ths depends on the prefxes of the segment. Thus, for segment a.b, assume there are m prefxes and the longest one s of length 32 l > 6, then the offset length for ths segment s l-6. Ths also means that for a destnaton IP address a.b.x.y, the a.b s used as the ndex of the egmentaton Table and the left most bts of x.y (from 6-th bt to (6+-)-th bt) s employed as that of the assocated NHA, f necessary. Actually, t depends on the set of prefxes of the segment as well as the length of each prefx. We now descrbe the mechansm to construct the NHA of a segment. Let l and h denote the length and the next hop (output port) of a route prefx p, respectvely. Let o = l 6 and = max{ o p P } ( NHA s of sze 2 ). Let P = {p, p,, p m- } be the set of sorted prefxes of a segment. Thus, for any par of prefxes p and p, < f and only f l l. For each prefx p n P, let and E denote the data structure of the start pont and end pont of p, respectvely, that should be forwarded to h. Wthout loss of generalty, let ma( ) and ma( E ) stand for the memory address of and E n the NHA, respectvely. Also let op( ) and op( E ) stand for the output port of destnaton addresses of start pont and end pont, respectvely. Assume p = a.b.x.y. Let x,x,x 2,,x 5 denote the bnary form of x.y, s,s,s 2,,s - denote the start pont mas, where s =, < o, and s =, o., and e,e,e 2,,e - denote the end pont mas, where e =, < o, and e =, o., Then we have ma( ) = (x,x,x 2,,x - AND s,s,s 2,,s - ) and ma( E ) = (x,x,x 2,,x - OR e,e,e 2,,e - ). For example, assume p = a.b.5., l = 26, and = 2 (the longest prefx n ths segment s of length 2). Then the bnary form of 5. (-bt) =, s,s,s 2,,s - =, and e,e,e 2,,e - =. We have ma( ) = = 2 and ma( E ) = = 3. Ths also means that NHA = h, ma( ) ma( E ). Pont to.. Fg. 3. Drect looup mechansm. 6 Bts 6 Bts IPv4 Address egment.. 32 Bts IPv4 Address Drectly pread for Exactly Matchng.. (4 GB) egment egmentaton Table (64K Entres)... Format Ponter/ 32 Bts.. Value < 256 ==> (Wthout NHA) Value > 255 ==> Ponter.. The ey pont of ths desgn s the constructon of the NHA. Fg. 4. Indrect looup mechansm //$. (c) IEEE

4 Pont to ( ) ( ).. 2 Fg. 5. Indrect looup mechansm wth varable offset length. We note that for each prefx p n P, we can fnd a par of and E. The memory addresses between ma( ) and ma( E ) can be depcted as an nterval [ma( ), ma( E )], and the set P of prefxes can be presented as a set of ntervals. If all the ntervals are not overlappng to each other, then we can construct the NHA drectly by settng NHA = h, ma( ) ma( E ). However, n most cases, ths may not 6 Bts IPv4 Address egment.. 2 egment egmentaton Table (64K Entres). ( 3 ) Bts () be true. An overlap stands for that for a destnaton IP address, we have more than one matchng. But remember what we are loong for s the longest matchng. Thus, f a memory address belongs to a set P of ntervals smultaneously, then we should set NHA = h, where p s the longest prefx of P. For example, assume each route prefx s presented by prefx/prefx length/next hop (output port). Then the set P of sx sorted prefxes {2.6/6/, 2.6.5//2, 2.6.2/24/, /26/3, /2/5, /32/} can be presented as the sx ntervals 6- Bts Remander Bts ( ) Value < 256 ==> (Wthout NHA) Value > 255 ==> Ponter Format Ponter/ 2 Bts 4 Bts to ndcate length ( +2 ) shown n Fg. 6(a). The correspondng constructed NHA s gven n Fg. 6(b). Now, let us consder another example where we have three prefxes on a segment: p =./6/, p =..5/2/2, and p 2 =..6/24/3. nce the longest prefx s of length 24, the offset length equals to 24-6 = (record as n the offset length feld). Then the NHA for ths segment s of sze 2 = 256 entres. Moreover, we have ma( ) = =, ma( E ) = = 255, ma( ) = = 4, ma( E ) = = 63, ma( 2 ) = = 6, ma( E ) = = 6. Therefore, NHA ~NHA 47 =, 2 NHA 4 ~NHA 63 = 2, NHA 64 ~NHA 67 =, NHA 6 = 3, and NHA 6 ~NHA 255 =. For destnaton IP address...4, the offset s, and the output port can be found n NHA =. For destnaton IP address..6.4, the offset s 6, and the output port can be found n NHA 6 = 3. Consder another extreme case where we have two sorted prefxes for a segment: p =.7/6/ and p =.7.2./32/2. nce the longest prefx s of length 32, the offset length equals to 32-6 = 6 (record as n the offset length feld). Then the NHA for prefx.7 has 2 6 = 64K entres. In ths case, we have ma( ) = =, ma( E ) = = 65535, ma( ) = ma( E ) = = 32. Thus, we have NHA ~NHA 3 =, NHA 32 = 2, and NHA 33 ~NHN =. For destnaton IP address.7.2., the offset s 32, and the output port can be found n NHA 32 = 2. For destnaton IP address.7.x.y, x,y 255, except.7.2., the offset q s (x 256+y), and the output port can be found n NHA q = /32/ p /2/5 p /26/3 p /24/ p 2 p 2.6.5//2 2.6/6/ p 3 5 E 3 E 2 E 2 4 E E 5 E 4 ma( )=, ma(e )= ma( )=, ma(e )=633 ma(2 ) = 23552, ma(e2 )= 237 ma(3 ) = 44, ma(e3 )=4 ma(4 ) = 6552, ma(e4 ) = ma(5 ) = 44, ma(e5 ) = ± (a) Interval presentaton of P (b) Constructed NHA Fg. 6. NHA constructon example //$. (c) IEEE 65535

5 The formal algorthm for constructng the NHA of a segment s gven as follows. Algorthm NHA-Constructon Input: The set of route prefxes of a segment; Output: The correspondng NHA of ths segment. tep. Let l and h be the length and output port of a route prefx p, respectvely. tep 2. Let P = {p,p,,p m- } be the set of sorted prefxes of a segment. Thus, for any par of prefxes p and p, < f and only f l l. tep 3. Let = l m- -6 /* The sze of NHA s 2 */ tep 4. For each prefx p n P, calculate and tep 5. For = to m- do NHA = h, ma( ) ma( E ); tep 6. top E. In the worst case, the number of memory accesses for an IP address looup s stll two for ths desgn, but the total amount of memory requred s reduced sgnfcantly. The forwardng database structure (NHAs) shown n Fg. 5 can be further mproved by employng the concept of compresson. Thus, for each segment wth offset length > 3, the assocated NHA can be replaced by a Code Word Array (CWA) and a compressed NHA (CNHA). To construct the CWA, we employ the technque of compresson bt map (CBM), one bt for each entry n the orgnal NHA. The compresson rule s as follows. Let a denote the value (port number) of the -th entry of the NHA, b stand for the correspondng bt n the CBM, and c denote the value (port number) of the -th entry of the CNHA. Intally, c = a, b =, and =. Then scan the NHA from left to rght. If a + = a, then b + =, else b + =, c = a +, and = +. For example, the NHA shown n Fg. 7(a) can be compressed nto the correspondng CBM and CNHA as shown n Fg. 7(b) (a) An NHA example Compresson Bt Compressed (b) The correspondng CNHA and CBM Fg. 7. NHA compresson example. Actually, the CBM and CNHA of a segment can be constructed drectly wthout constructng the NHA frst. The algorthm to construct the CBM and CNHA drectly from the gven prefxes of a segment s depcted as follows. Before startng, we need to note that for any two dstnct prefxes n a segment, ether one s completely contaned n the other, or the two dstnct prefxes have no entres overlappng wth each other [5]. Algorthm CBM/CNHA-Constructon Input: The set P = {p,p,,p m- } of sorted route prefxes of a segment and L = {, E,, E,,, E }. m m Output: CBM and CNHA. tep. ort L by memory address n the segment. For dentcal memory addresses, eep ther order the same n L. tep 2. Let A = φ and stac C = φ. tep 3. Process the elements n L from left to rght and for each element do Begn If the selected element s a start pont then Push n C. Append n A. Else /* It s an end pont E */ Begn Remove top element from stac C. If the top of stac C s then Begn Append + n A, + where op( ) = op( ), + ma( ) = ma( E )+. Replace the top of stac C by End Else /* tac C s φ */ Do nothng. End End tep 4. Compact A such that for consecutve elements +. and q p, remove q from A f ma( ) = ma( p ), q q remove p from A f op( ) = op( p ). tep 5. Remove each element from A whose ma( ) > ma( E ); tep 6. For = to A - do /* A s the number of elements n A */ Begn Let End tep 7. top be the -th element n A ; CBM p = ; where p = ma( ); CNHA = op( ) //$. (c) IEEE

6 The tme complexty of the proposed algorthm s O(nlogn), where n s the number of prefxes n a segment. nce ths algorthm constructs the CBMs and CNHAs drectly from the gven prefxes, the forwardng table can be bult n a very short tme. The CBM should be encoded as a sequence of code words (Code Words Array, CWA) as follows. Each code word conssts of a map (6-bt) and a base (6-bt). The CBM s treated as a bt-stream and been parttoned nto a sequence of 6-bt maps. Then these maps are put nto the code words, one for each code word, sequentally. The base of each code word equals to the number of s accumulated n the maps of prevous code words. For example, the CBM shown n Fg. 7(b) s encoded as the code words depcted n Fg.. The maps of the frst two code words are and, respectvely. For the frst code word, the base has a value of zero. For the second code word, snce the number of s accumulated n the maps of prevous code words s two, we have a base value of two. The base s used to ndcate the start entry of the assocated CNHA. Thus, for an offset value q, the output port can be computed as follows. Let cw s = map s + base s be the code word contans ths offset, where s = (q DIV 6). Let w = (q MOD 6) denote the correspondng bt of q n map s and w stand for the number of accumulated s from the th bt to the w-th bt of map s. Then the output port of an offset value q s calculated as op q = CHNA t, where t = base s + w -. For example, consder the case shown n Fg. 7 and agan. For offset q =, we have s =, w =, and w = 2, then t = (base + w -) = +2- = and the correspondng output port s CNHA = port. For offset value q = 25, we have s =, w =, and w =, then t = (base + w -) = 2+- = 2 and the correspondng output port s CNHA 2 = port 7. To update the forwardng table, we can ether rebuld a new one n a short tme or through specal hardware desgn, such as dual-port memory or dual-memory bans. IV. HARDWARE IMPLEMENTATION The hgh-level hardware mplementaton of the proposed looup scheme s shown n Fg.. Frst of all, the frst 6 bts (bts ~5) of an ncomng IP address are used as an ndex of the egment Table (64K entres, each wth a length of 24 bts). The correspondng entry of the egment Table records ether the next hop (the value of left 2 bts < 256) of ths destnaton IP address, or a ponter (2-bt), ponts to the startng address of the CWA, and an offset length (4-bt). For each segment, f the offset length > 3, then we need to decode the CNHA by searchng the CWA (wth 2-4 entres) and fndng the assocated code word. From ths code word, we have the map and base. nce the CNHA s placed mmedately follows the CWA, the startng address of CNHA equals to ponter An adder s desgned here to add ths wth base and w. If 3, then the bts, startng from the 6-th bt of the destnaton IP address, are used as the ndex of the NHA (wth 2 entres) to fnd the output port. The value of w can be computed by a parallel adder. For example, assume for a segment wth offset length = and we have a destnaton IP address a.b.5.y wth offset of 5. Then we should loo at the s-th code word, where s = 5 DIV 6 =. Assume the map of ths code word s, then the bt poston for ths offset s 5 MOD 6 = 4. Let B denote the bt stream from the -th bt to -th bt of an IP address and V ( B ) stand for the value of bt stream B. To compute the value of w, we can frst + 2 mas the rght 6- V ( B + 5 ) - bts of the code word nto zero and then calculate the number of s n ths mased code word by the parallel adder n constant tme. For the current AIC technology, ths can be done n ns. We note that the wdth of the code word s 32-bt and s dentcal to that of the data bus. Ths means we only need a memory access to obtan a code word n the CWA. For a destnaton IP address a.b.x.y, we frst use a.b ( V ( B 5 )) as the ndex of the segmentaton table. If the offset length of ths segment s less than or equal to 3, then we get the output port from the NHA drectly. Ths s the case for two memory accesses. If the offset length s greater than 3, then we use 6 ponter+ V ( B + ) as the ndex of the CWA to get the correspondng code word. d on the obtaned map and base, we fnally get the output port on the CNHA. Thus, n ths hardware mplementaton, the maxmum number of memory accesses for a looup s three. Let us use an example to show how the forwardng table (CBMs, and CNHAs) s constructed n ths mplementaton. Assume the routng table contans entres (262 segments) as shown n Fg.. The correspondng egment Table and three CWAs/CNHAs for prefxes 4.5, 4., and 6.5, respectvely are also shown n Fg.. A null value n the CNHA means that the correspondng IP pacets should be forwarded to the default router. Code Word 6 Bts 6 Bts Code Word Array Compressed Fg.. Code Word Array example //$. (c) IEEE

7 Ponter/ eg. Table Length - 2 Bts 4 Bts + 2 m = 6- V ( B )- + 5 Dstn. Addr. 5 V ( B 5 ) 2 6 V ( 6 B +5 ) Ponter+2-4 x4- Yes Ponter Yes + 6 V ( B + ) 6 Bts 2-4 > 3 Code Word Array Mas m Bts 6 Bts Parallel Adder Adder Compressed Array Bts elector +5 No 3 Entry Format of egmentaton Table Ponter/ 2 Bts 4 Bts to ndcate length - V ( 6 B +5 Value < 256 ==> (Wthout CWA/CNHA) Value > 255 ==> Ponter ) Array 2 n Bts Routng Table Prefx Length Port egmentaton Table egment ID Ponter/ Length Null Null PonterA PonterB Fg.. Hardware mplementaton of the proposed looup scheme PonterC 4.2 Null Bts 6 Bts 6 Bts 6 Bts Bts 6 Bts Null Null 6.5 PonterD 3 V. PERFORMANCE ANALYI To evaluate the performance of the forwardng tables constructed by the proposed looup scheme, a number of IP routng tables were collected and nvestgated. The Internet routng tables avalable at the web ste for the Internet Performance Measurement and Analyss (IMPA) proect are referred [,]. For the purpose of comparson, two looup schemes, DIR-24- and DIR-2-3-, proposed by Gupta, et al., [5], and the small forwardng table looup scheme (denoted as FT scheme), proposed by W. Degermar, et al., [3], are also nvestgated. Fg.. Forwardng table example //$. (c) IEEE The performance comparson for these dfferent looup schemes s shown n Table 2. The forwardng table constructed by the FT scheme s the smallest one, and can be mplemented n the RAM. However, the mnmum and maxmum number of memory accesses for an IP address looup s two and nne, respectvely. Ths may not be good enough for ggabt swtchng routers. The mnmum and maxmum number of memory accesses for an IP address looup contrbuted by the DIR-24- scheme s one and two, respectvely. Ths s pretty good for the hgh-speed ggabt swtchng routers. Nevertheless, the forwardng table constructed by ths scheme s of sze 33 Mbytes, the largest

8 one among these schemes. The DIR-2-3- scheme reduces the forwardng table to Mbytes by employng an ntermedate table, but the maxmum number of memory accesses for a looup s up to three. Bascally, the desgn of these two schemes tends to support up to 4, segments wth long prefxes (length > 24). If ths s not requred, then the memory requred can be reduces to 6 Mbytes and Mbytes, respectvely. Due to the usage of huge memory, ths scheme s not easy to put the forwardng table n the faster RAM wth low cost. The looup scheme proposed n ths paper also ntroduces a small forwardng table (45Kbytes ~ 47 Kbytes). Moreover, most of the looup can be fnshed by only one memory access. In the worst case, the number of memory accesses requred for a looup s three. Actually, when mplemented n a ppelne sll n hardware, the proposed mechansm can acheve one routng looup every memory access. Ths small forwardng table s very sutable to be mplemented n faster RAM. Wth current ns RAM, ths mechansm furnshes approxmately 6 routng looups per second. The mplementaton cost s also very compettve. Wth 52 Kbytes RAM, only about U$3 s enough. We note that the forwardng table sze s depends on the number of route prefxes as well as the length dstrbuton of these prefxes. For the DIR-24- and DIR-2-3- looup schemes, an NHA of sze 2 entres (bytes) s needed f the length of the longest prefx n a segment s greater than 24. Thus, the forwardng table sze s hghly depends on the number of segments, each of whch contans at least one long prefx (length > 24). For the FT looup scheme, a specal compressed NHA of sze 2 entres s needed f the length of the longest prefx n a segment s greater than 6. In our proposed looup scheme, a CWA and a CNHA are needed f the length of the longest prefx n a segment s greater than 6 and offset length > 3. But the sze of the CWA equals to bytes, where s the length of the longest prefx n the segment, and the sze of the CNHA equals to the number of non-zero bts n the CWA. To show the performance of these dfferent looup schemes under more extreme cases, we consder a routng table of 4, route prefxes (randomly generated) and 4, dstnct segments contan at least one long prefx (length > 24). Table 3 shows the memory requred by dfferent looup schemes under ths envronment. We can see that the forwardng tables constructed by the DIR-24- and DIR-2-3- looup schemes for ths routng table are 33 Mbytes and Mbytes, respectvely. Ths s because these two looup schemes tend to furnsh up to 4, segments wth long prefxes (length > 24) and are ndependent upon the dstrbuton of the prefxes. The forwardng table produces by the FT scheme s around 5Kbytes ~ 6Kbytes. That for our scheme s of.5 Mbytes ~ 2 Mbytes. Ths s because both the FT scheme and our scheme tae nto account the dstrbuton of the prefxes. VI. CONCLUION Ths artcle ntroduces a novel route looup mechansm that only needs tny RAM and can be easly mplemented n hardware. d on the proposed scheme, the forwardng table s tny enough to ft n RAM wth very low cost. For example, a large routng table wth 4, routng entres can be compacted to a forwardng table of Kbytes wth the cost of less U$3. Most of the address looups can be done by a memory access. In the worst case, the number of memory accesses for a looup s three. When mplemented n a ppelne sll n hardware, the proposed mechansm can acheve one routng looup every memory access. Wth current ns RAM, ths mechansm furnshes approxmately 6 routng looups per second. Ths s much faster than any current commercally avalable routng looup schemes. d on the proposed algorthm, the CBM and CNHA of a segment can be constructed n O(nlogn) tme; where n s the number of prefxes n the segment. Ths provdes an opportunty to update the forwardng table n a quc and effcent way. nce the forwardng table can be constructed n a short tme, we can ether rebuld a new one when necessary or employ the hardware of dual-port memory or dual- memory bans. Table II PERFORMANCE COMPARION OF DIFFERENT LOOKUP CHEME. Loo up cheme No. of memory accesses (Mn/Max) Forwardng Table ze Implemented n RAM Our cheme /3 45KB ~ 47 KB Yes DIR-24- /2 33MB No DIR-2-3- /3 MB No FT 2/ 5KB ~ 6KB Yes Table III MEMORY REQUIRED TO UPPORT 4, EGMENT WITH LONGET PREFIXE Loo up cheme Our cheme DIR-24- DIR-2-3- FT (24 < LENGTH 32). Forwardng Table ze.5 MB ~ 2MB 33MB MB 5KB ~ 6KB REFERENCE [] F. Baer, ed. Requrements for IP Verson 4 Routers. RFC 2, June 5. [2]. Deerng and R. Hnden. Internet Protocol, Verson 6 (Ipv6) pecfcaton. Request for Comments (Proposed tandard) RFC 3, Internet Engneerng Tas Force, January 6. [3] M. Degermar, A. Brodn,. Carlsson, and. Pn. mall Forwardng Tables for Fast Routng Looups. ACM IGCOMM 7, Palas des Festvals, Cannes, France, pp [4] W. Doernger, G. Karoth, and M. Nasseh, Routng on Longest- Matchng Prefxes, IEEE/ACM Transactons on Networng, Vol.4, No., February 6, pp.6-7. [5] P. Gupta,. Ln, and N. McKeown. Routng Looups n Hardware at Memory Access peeds. IEEE INFOCOM, an Francsco, Aprl, esson B-. [6] B. Lampson, V. rnvasan, and G. Varghese, IP Looups usng Multway and Multcolumn earch, IEEE INFOCOM, an Francsco, Aprl, esson B-2. [7] A. McAuley, P. Francs. Fast Routng Looup Usng CAMs. Proc. IEEE INFOCOM 3. [] T. Pe and C. Zuowa. Puttng Routng Tables n llcon. IEEE Networ Magazne, January 2. [] Y. Rehter, T. L, An Archtecture for IP Address Allocaton wth CIDR, RFC 5, eptember 3. [] The Routng Arbter Proect. Internet routng and networ statstc. [] Mchgan Unversty and Mert Networ, Internet Performance Measurement and Analyss (IPMA) Proect, [2] tanford Unversty Worshop on Fast Routng and wtchng, December 6. [3] M. Waldvogel, G. Varghese, J. Turner, B. Plattner. calable Hgh peed IP Routng Looups. ACM IGCOMM 7, Palas des Festvals, Cannes, France, pp //$. (c) IEEE

THE advent of the World Wide Web (WWW) has doubled

THE advent of the World Wide Web (WWW) has doubled IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 17, NO. 6, JUNE 1999 1093 A Novel IP-Routing Lookup Scheme and Hardware Architecture for Multigigabit Switching Routers Nen-Fu Huang, Member, IEEE,

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS CACHE MEMORY DESIGN FOR INTERNET PROCESSORS WE EVALUATE A SERIES OF THREE PROGRESSIVELY MORE AGGRESSIVE ROUTING-TABLE CACHE DESIGNS AND DEMONSTRATE THAT THE INCORPORATION OF HARDWARE CACHES INTO INTERNET

More information

CSE 326: Data Structures Quicksort Comparison Sorting Bound

CSE 326: Data Structures Quicksort Comparison Sorting Bound CSE 326: Data Structures Qucksort Comparson Sortng Bound Bran Curless Sprng 2008 Announcements (5/14/08) Homework due at begnnng of class on Frday. Secton tomorrow: Graded homeworks returned More dscusson

More information

CSE 326: Data Structures Quicksort Comparison Sorting Bound

CSE 326: Data Structures Quicksort Comparison Sorting Bound CSE 326: Data Structures Qucksort Comparson Sortng Bound Steve Setz Wnter 2009 Qucksort Qucksort uses a dvde and conquer strategy, but does not requre the O(N) extra space that MergeSort does. Here s the

More information

Buffering High-Speed Packets with Tri-Stage Memory Array and Its Performance Analysis

Buffering High-Speed Packets with Tri-Stage Memory Array and Its Performance Analysis 000-9825/2005/6(2)28 2005 Journal of Software Vol6, No2,2+, 2,, (,00084) 2 (, 450002) Bufferng Hgh-Speed Packets wth Tr-Stage Memory Array and Its Performance Analyss WANG Peng,2+, YI Peng 2, JIN De-Peng,

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE 1 ata Structures and Algorthms Chapter 4: Trees BST Text: Read Wess, 4.3 Izmr Unversty of Economcs 1 The Search Tree AT Bnary Search Trees An mportant applcaton of bnary trees s n searchng. Let us assume

More information

IP Packet Forwarding Based on Comb Extraction Scheme

IP Packet Forwarding Based on Comb Extraction Scheme IP Packet Forwardng Based on omb Extracton Scheme Zhen Xu [ ], Gerard amm [ ], Ioanns Lambadars [ 3], and Yqang Q. Zhao [] [] School of Mathematcs and Statstcs, arleton Unversty, Ottawa, anada, {zxu, zhao}@math.carleton.ca

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Greedy Technique - Definition

Greedy Technique - Definition Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Maximum Weight Matching Dispatching Scheme in Buffered Clos-Network Packet Switches

Maximum Weight Matching Dispatching Scheme in Buffered Clos-Network Packet Switches Maxmum Weght Matchng Dspatchng Scheme n Buffered Clos-Network Packet Swtches Roberto Roas-Cessa, Member, IEEE, E Ok, Member, IEEE, and H. Jonathan Chao, Fellow, IEEE Abstract The scalablty of Clos-network

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Insertion Sort. Divide and Conquer Sorting. Divide and Conquer. Mergesort. Mergesort Example. Auxiliary Array

Insertion Sort. Divide and Conquer Sorting. Divide and Conquer. Mergesort. Mergesort Example. Auxiliary Array Inserton Sort Dvde and Conquer Sortng CSE 6 Data Structures Lecture 18 What f frst k elements of array are already sorted? 4, 7, 1, 5, 1, 16 We can shft the tal of the sorted elements lst down and then

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Today s Outline. Sorting: The Big Picture. Why Sort? Selection Sort: Idea. Insertion Sort: Idea. Sorting Chapter 7 in Weiss.

Today s Outline. Sorting: The Big Picture. Why Sort? Selection Sort: Idea. Insertion Sort: Idea. Sorting Chapter 7 in Weiss. Today s Outlne Sortng Chapter 7 n Wess CSE 26 Data Structures Ruth Anderson Announcements Wrtten Homework #6 due Frday 2/26 at the begnnng of lecture Proect Code due Mon March 1 by 11pm Today s Topcs:

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast

Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast ptmal strbuton of Remotely-Subscrbed Multcast Traffc wthn a Proxy Moble v6 oman by Usng Explct Multcast us M. Contreras *, Carlos J. Bernardos * Core Networ Evoluton Telefónca I+ on Ramón de la Cruz, 82-84,

More information

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

ATYPICAL SDN consists of a logical controller in the

ATYPICAL SDN consists of a logical controller in the IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 25, NO. 6, DECEMBER 2017 3587 Mnmzng Flow Statstcs Collecton Cost Usng Wldcard-Based Requests n SDNs Hongl Xu, Member, IEEE, Zhuolong Yu, Chen Qan, Member, IEEE,

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

CPE 628 Chapter 2 Design for Testability. Dr. Rhonda Kay Gaede UAH. UAH Chapter Introduction

CPE 628 Chapter 2 Design for Testability. Dr. Rhonda Kay Gaede UAH. UAH Chapter Introduction Chapter 2 Desgn for Testablty Dr Rhonda Kay Gaede UAH 2 Introducton Dffcultes n and the states of sequental crcuts led to provdng drect access for storage elements, whereby selected storage elements are

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp

Life Tables (Times) Summary. Sample StatFolio: lifetable times.sgp Lfe Tables (Tmes) Summary... 1 Data Input... 2 Analyss Summary... 3 Survval Functon... 5 Log Survval Functon... 6 Cumulatve Hazard Functon... 7 Percentles... 7 Group Comparsons... 8 Summary The Lfe Tables

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

(1) The control processes are too complex to analyze by conventional quantitative techniques.

(1) The control processes are too complex to analyze by conventional quantitative techniques. Chapter 0 Fuzzy Control and Fuzzy Expert Systems The fuzzy logc controller (FLC) s ntroduced n ths chapter. After ntroducng the archtecture of the FLC, we study ts components step by step and suggest a

More information

Esc101 Lecture 1 st April, 2008 Generating Permutation

Esc101 Lecture 1 st April, 2008 Generating Permutation Esc101 Lecture 1 Aprl, 2008 Generatng Permutaton In ths class we wll look at a problem to wrte a program that takes as nput 1,2,...,N and prnts out all possble permutatons of the numbers 1,2,...,N. For

More information

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member

More information

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University Approxmate All-Pars shortest paths Approxmate dstance oracles Spanners and Emulators Ur Zwck Tel Avv Unversty Summer School on Shortest Paths (PATH05 DIKU, Unversty of Copenhagen All-Pars Shortest Paths

More information

TRLE An Efficient Data Compression Scheme for Image Composition of Parallel Volume Rendering Systems

TRLE An Efficient Data Compression Scheme for Image Composition of Parallel Volume Rendering Systems TRLE An Effcent Data Compresson Scheme for Image Composton of Parallel Volume Renderng Systems Chn-Feng Ln, Yeh-Chng Chung, and Don-Ln Yang Department of Informaton Engneerng Feng Cha Unversty, Tachung,

More information

FORESIGHTED JOINT RESOURCE RECIPROCATION AND SCHEDULING STRATEGIES FOR REAL-TIME VIDEO STREAMING OVER PEER-TO-PEER NETWORKS

FORESIGHTED JOINT RESOURCE RECIPROCATION AND SCHEDULING STRATEGIES FOR REAL-TIME VIDEO STREAMING OVER PEER-TO-PEER NETWORKS FORESIGHTED JOINT RESOURCE RECIPROCATION AND SCHEDULING STRATEGIES FOR REAL-TIME VIDEO STREAMING OVER PEER-TO-PEER NETWORKS Sunghoon Ivan Lee, Hyunggon Park, and Mhaela van der Schaar Electrcal Engneerng

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Self-tuning Histograms: Building Histograms Without Looking at Data

Self-tuning Histograms: Building Histograms Without Looking at Data Self-tunng Hstograms: Buldng Hstograms Wthout Lookng at Data Ashraf Aboulnaga Computer Scences Department Unversty of Wsconsn - Madson ashraf@cs.wsc.edu Surajt Chaudhur Mcrosoft Research surajtc@mcrosoft.com

More information

More on Sorting: Quick Sort and Heap Sort

More on Sorting: Quick Sort and Heap Sort More on Sortng: Quck Sort and Heap Sort Antono Carzanga Faculty of Informatcs Unversty of Lugano October 12, 2007 c 2006 Antono Carzanga 1 Another dvde-and-conuer sortng algorthm The heap Heap sort Outlne

More information

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vdyanagar Faculty Name: Am D. Trved Class: SYBCA Subject: US03CBCA03 (Advanced Data & Fle Structure) *UNIT 1 (ARRAYS AND TREES) **INTRODUCTION TO ARRAYS If we want

More information

Annales UMCS Informatica AI 1 (2003) UMCS. Designing of multichannel optical communication systems topologies criteria optimization

Annales UMCS Informatica AI 1 (2003) UMCS. Designing of multichannel optical communication systems topologies criteria optimization Annales Informatca AI 1 (2003) 277-284 Annales Informatca Lubln-Polona Secto AI http://www.annales.umcs.lubln.pl/ Desgnng of multchannel optcal communcaton systems topologes crtera optmzaton Mrosław Hajder,

More information

Memory Modeling in ESL-RTL Equivalence Checking

Memory Modeling in ESL-RTL Equivalence Checking 11.4 Memory Modelng n ESL-RTL Equvalence Checkng Alfred Koelbl 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 koelbl@synopsys.com Jerry R. Burch 2025 NW Cornelus Pass Rd. Hllsboro, OR 97124 burch@synopsys.com

More information

CS1100 Introduction to Programming

CS1100 Introduction to Programming Factoral (n) Recursve Program fact(n) = n*fact(n-) CS00 Introducton to Programmng Recurson and Sortng Madhu Mutyam Department of Computer Scence and Engneerng Indan Insttute of Technology Madras nt fact

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information